Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?

iot-academy 217 views 21 slides Jun 28, 2017
Slide 1
Slide 1 of 21
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21

About This Presentation

Tijdens de IoT Academy meetup op 22 juni 2017 stond het thema IoT beveiliging centraal. Nu steeds meer apparaten verbonden zijn met het internet en met de komst van 'smart cities' zelfs hele steden afhankelijk zijn geworden van het internet zijn we als samenleving kwetsbaarder dan ooit. De b...


Slide Content

KPN REDTEAM
Be Smart Be Secure

KPN REDTEAM
What is a Smart City?
Using modern ICT and IoTtechnology in a secure way to manage a
city’s asset and improve urban space with interaction with citizens
to increase quality of life

KPN REDTEAM
Implementations:
•Lanterns
•Industrial Cooling
•Smart waste
•Legionella detector
•Street cover
•Sea pumps
•Bike
•Luxury asset
•Solar Panel
•Smart office space
•Parking
•Transport management
•Health sector
•City information

KPN REDTEAM

KPN REDTEAM
Kill Chain Stages of a Target Cyber Intrusion
Stage Action Methodology
Stage 1
Reconnaissance Harvesting Email Addresses, Social Networking, Passive Search, IP Port Scanning
Weaponization Developing Exploit with Payload Creation, Malware, Delivery systems, Decoys
Delivery Spear Phishing, Infected Website, Service Provider, USB
Stage 2
Exploitation Activation, Execute Code, Establish Foothold, 3
rd
party Exploitation
Installation Trojan or Backdoor, Escalate Privileges, Root Kit, Establish Persistence
Stage 3
Command & Control Command Channel, Lateral Movement, Internal Recon, Maintain Persistence
Actions on Target Expand Compromise, Consolidate Persistence, identify Targets, Data Ex-filtration

KPN REDTEAM

KPN REDTEAM

KPN REDTEAM

KPN REDTEAM
Some of the challenges
Contracts
What about cyber security and privacy?
Development
With all of the technology and standards how can
we make this secure?
Monitor
How can we monitor attacks and unusual
behavior?
Architecture
Can we scale the architecture for the long term?
And what about multiple layers of defense?
Maintain
How can we update and manage so many
devices?

KPN REDTEAM
Contract challenges
How does cyber
security fit into a
30 year contract?

KPN REDTEAM
Development challenges
Extensive—but not exhaustive—list of
Internet of Things (IoT) protocols:
Bluetooth
BLE
ZigBee
Z-Wave
6LoWPAN
Thread
WiFi-ah (HaLow)
2G (GSM)
3G & 4G
LTE Cat 0, 1, & 3
LTE-M1
NB-IoT
5G
NFC
RFID
SigFox
LoRaWAN
Ingenu
Weightless-W
ANT & ANT+
DigiMesh
MiWi
EnOcean
Dash7
The application shall
communicate with mobiles,
cloud, data hub and sensors
from all of our suppliers. Oh
yeah, it must be secure and we
need it next week

KPN REDTEAM
Architecture challenges
How flexible is our architecture with the
amount of growing devices and
standards?
How to deal with segmentation to
reduce risks in case of a compromise?

KPN REDTEAM
Vulnerability management
How do we perform patch
management?
Can we reduce the life time of a
sensor?

KPN REDTEAM
REDteamingmodel
Level 3
Level 2
Level 1
Cyber
Zero
knowledge
Physical
Zero
knowledge
Human
Zero
knowledge
Cyber
Limited
insider
Physical
Limited
insider
Human
Limited
insider
Cyber
Trusted
insider
Physical
Trusted
insider
Human
Trusted
insider
Target

KPN REDTEAM
Elements of REDteaming
A red team exercise simulates criminal activity to challenge a company on their social, technical, and physical
defenses:
Physical
Finding weaknesses in your physical
defenses
•Gaining unauthorized access to
buildings and area’s
•Tailgating,
•Badge ID’s
•Drones
•Lock picking doors
Cyber
Finding weaknesses in your technical
defenses
•Gaining unauthorized access to your
infrastructure and your data
•Malware attack
•Password brute force on all systems
Human
Finding weaknesses in your social
defenses
•Gaining unauthorized access
through your employees
•Social engineering
•Infected USB sticks
•Excuses to gain access
•Gain trust from employees

KPN REDTEAM

KPN REDTEAM
Take away
•Embed security into the DNA of smart city development
•Hug the hackers and promote responsible disclosure
•Perform regular REDteam/simulation exercises

KPN REDTEAM
•Twee lossearduino’s
•De rechterheefteentemp sensor
•De linker heefteenLCD scherm
•Middels433 mhzverbindingwordtde temperatuur
verzonden.

KPN REDTEAM
GQRX
•De signaalkunnenwe
capturenmet eenSDR
software defined Radio
•Het signaalrecordenen
vervolgensanalyseren

KPN REDTEAM
Audacity
•Het signaalheefteen
binary structuur
•De temperatuuris
22 graden
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 01 1 0

KPN REDTEAM
Thank you
Mark de Groot
TeamLeadKPN REDteam
[email protected]
IoTis all about the application and infrastructure
and it must be secure from the start and into the future